{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T16:58:08Z","timestamp":1725641888668},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642272448"},{"type":"electronic","value":"9783642272455"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27245-5_37","type":"book-chapter","created":{"date-parts":[[2011,12,9]],"date-time":"2011-12-09T09:37:08Z","timestamp":1323423428000},"page":"314-323","source":"Crossref","is-referenced-by-count":4,"title":["Secure Money Transaction in NFC Enabled Mobile Wallet Using Session Based Alternative Cryptographic Techniques"],"prefix":"10.1007","author":[{"given":"Riti","family":"Chowdhury","sequence":"first","affiliation":[]},{"given":"Debashis","family":"De","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"37_CR1","first-page":"45","volume-title":"2nd International Workshop on Near Field Communication","author":"B. Beny\u00f3","year":"2010","unstructured":"Beny\u00f3, B., S\u00f3dor, B., F\u00f6rd\u0151s, G., Kov\u00e1cs, L., Vilmos, A.: A generalize approach for NFC application development. In: 2nd International Workshop on Near Field Communication, pp. 45\u201350. IEEE Press, Monaco (2010)"},{"key":"37_CR2","doi-asserted-by":"crossref","unstructured":"Chen, W., Hancke, G.P., Mayes, K.E., Lien, Y., Chiu, J.-H.: NFC Mobile Transactions and Authentication Based on GSM Network. In: 2nd International Workshop on Near Field Communication, NFC, pp. 83\u201389. IEEE Press (2010)","DOI":"10.1109\/NFC.2010.15"},{"key":"37_CR3","first-page":"55","volume-title":"Proceedings of the 3rd International Conference on Wireless and Mobile Communications","author":"G. K\u00e1lm\u00e1n","year":"2007","unstructured":"K\u00e1lm\u00e1n, G., Noll, J.: SIM as Secure Key Storage in Communication Networks. In: Proceedings of the 3rd International Conference on Wireless and Mobile Communications, pp. 55\u201361. IEEE Press, Guadeloupe (2007)"},{"key":"37_CR4","first-page":"1","volume-title":"5th European Workshop on RFID Systems and Technologies","author":"A. Jara","year":"2009","unstructured":"Jara, A., Zamora, M.A., Skarmeta, A.F.G.: Secure use of NFC in medical envi-ronments. In: 5th European Workshop on RFID Systems and Technologies, pp. 1\u20138. IEEE Press, Bremen (2009)"},{"key":"37_CR5","first-page":"187","volume-title":"International Conference on Anti-Counterfeiting, Security, and Identification in Communication","author":"C.-M. Leung","year":"2009","unstructured":"Leung, C.-M.: Depress phishing by CAPTCHA with OTP. In: International Conference on Anti-Counterfeiting, Security, and Identification in Communication, pp. 187\u2013192. IEEE Press, Hong Kong (2009)"},{"key":"37_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/AHICI.2009.5340290","volume-title":"First Asian Himalayas International Conference in Internet","author":"P.B. Tiwari","year":"2009","unstructured":"Tiwari, P.B., Joshi, S.R.: Single sign-on with one time password. In: First Asian Himalayas International Conference in Internet, pp. 1\u20134. IEEE Press, Kathmandu (2009)"},{"key":"37_CR7","first-page":"43","volume-title":"International Conference on the Management of Mobile Business","author":"J. Ondrus","year":"2007","unstructured":"Ondrus, J., Pigneur, Y.: An Assessment of NFC for Future Mobile Payment Systems. In: International Conference on the Management of Mobile Business, pp. 43\u201353. IEEE Press, Toronto (2007)"},{"key":"37_CR8","first-page":"695","volume-title":"Proc. International Conference on Reliability and Security","author":"C. Mulliner","year":"2009","unstructured":"Mulliner, C.: Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones. In: Proc. International Conference on Reliability and Security, pp. 695\u2013700. IEEE Press, Fukuoka (2009)"},{"key":"37_CR9","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/CTS.2008.4543918","volume-title":"Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems","author":"M. Pasquet","year":"2008","unstructured":"Pasquet, M., Reynaud, J., Rosenberger, C.: Secure payment with nfc mobile phone in the smarttouch project. In: Proceedings of the 2008 International Symposium on Collaborative Technologies and Systems, pp. 95\u201398. IEEE Press, Irvine (2008)"},{"key":"37_CR10","first-page":"1665","volume-title":"World Congress on Nature & Biologically Inspired Computing","author":"Raghuwanshi","year":"2009","unstructured":"Raghuwanshi, Pateria, R.K., Singh, R.P.: A new protocol model for verification of payment order information integrity in online Epayment system. In: World Congress on Nature & Biologically Inspired Computing, pp. 1665\u20131668. IEEE Press, Coimbatore (2009)"},{"key":"37_CR11","unstructured":"The Transformational Power of NFC, http:\/\/www.mobimatter.com\/category\/topic\/nfc-rfid\/"},{"key":"37_CR12","first-page":"162","volume-title":"Proceedings of International Conference on Computer and Communication Engineering","author":"T.S. Fun","year":"2008","unstructured":"Fun, T.S., Beng, L.Y., Likoh, J., Roslan, R.: A light-weight and Private Mobile Payment Protocol by Using Mobile Network Operator. In: Proceedings of International Conference on Computer and Communication Engineering, pp. 162\u2013166. IEEE Press, Kuala Lumpur (2008)"},{"key":"37_CR13","first-page":"93","volume-title":"First International Workshop on Near Field Communication","author":"S. Grunberger","year":"2009","unstructured":"Grunberger, S., Langer, J.: Analysis and test results of tunneling IP over NFCIP-1. In: First International Workshop on Near Field Communication, pp. 93\u201397. IEEE Press, Hagenberg (2009)"}],"container-title":["Communications in Computer and Information Science","Computer Information Systems \u2013 Analysis and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27245-5_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T13:49:28Z","timestamp":1561038568000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27245-5_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642272448","9783642272455"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27245-5_37","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}